Re: Roots that are identical except for signature algorithm and serial number

2009-06-04 Thread Rick Andrews
How about the subject key ID?  Did it change? No, it didn't. The key and SKI stayed the same. ... New Mozilla browsers released after this date do not and will not have the problem you described above.  So, it should not be necessary to retain the MD2 certs in the root list for these new

Re: Roots that are identical except for signature algorithm and serial number

2009-06-04 Thread Rick Andrews
How about the subject key ID?  Did it change? No, it didn't. The key and SKI stayed the same. ... New Mozilla browsers released after this date do not and will not have the problem you described above.  So, it should not be necessary to retain the MD2 certs in the root list for these new

Re: Roots that are identical except for signature algorithm and serial number

2009-06-04 Thread Rick Andrews
How about the subject key ID?  Did it change? No, it didn't. The key and SKI stayed the same. ... New Mozilla browsers released after this date do not and will not have the problem you described above.  So, it should not be necessary to retain the MD2 certs in the root list for these new

Re: Roots that are identical except for signature algorithm and serial number

2009-05-29 Thread Nelson B Bolyard
On 2009-05-28 13:09 PDT, Frank Hecker wrote: Nelson B Bolyard wrote: An SSL server that sends out a full chain with a SHA256 root could conceivably cause a problem for a remote SSL client that does not understand SHA256 signatures and that chooses to check the signature on the received root

Re: Roots that are identical except for signature algorithm and serial number

2009-05-29 Thread Rick Andrews
On May 28, 3:12 pm, Nelson B Bolyard nel...@bolyard.me wrote: On 2009-05-28 10:52 PDT, Kathleen Wilson wrote: Just to make sure I understand… In the VeriSign case the MD2 roots expire on 2028-08-01, and the SHA1 roots expire on 2028-08-02, so the SHA1 roots would take precedence in NSS.

Re: Roots that are identical except for signature algorithm and serial number

2009-05-29 Thread Nelson B Bolyard
On 2009-05-29 09:22 PDT, Rick Andrews wrote: On May 28, 3:12 pm, Nelson B Bolyard nel...@bolyard.me wrote: On 2009-05-28 10:52 PDT, Kathleen Wilson wrote: Just to make sure I understand… In the VeriSign case the MD2 roots expire on 2028-08-01, and the SHA1 roots expire on 2028-08-02, so the

Re: Roots that are identical except for signature algorithm and serial number

2009-05-28 Thread Frank Hecker
Nelson B Bolyard wrote re retaining copies of old roots after their replacement by new roots: I recommend that for CAs whose newer root certs bear exactly the same notBefore and notAfter dates as the older certs. In that case, it may be necessary to retain all the relevant root certs, all

Re: Roots that are identical except for signature algorithm and serial number

2009-05-28 Thread Kathleen Wilson
Just to make sure I understand… In the VeriSign case the MD2 roots expire on 2028-08-01, and the SHA1 roots expire on 2028-08-02, so the SHA1 roots would take precedence in NSS. Therefore, there is no benefit in keeping the MD2 roots, and the MD2 roots should be removed when the SHA1 roots are

Re: Roots that are identical except for signature algorithm and serial number

2009-05-28 Thread Frank Hecker
Nelson B Bolyard wrote: An SSL server that sends out a full chain with a SHA256 root could conceivably cause a problem for a remote SSL client that does not understand SHA256 signatures and that chooses to check the signature on the received root cert rather than, or in addition to, relying on

Re: Roots that are identical except for signature algorithm and serial number

2009-05-28 Thread Frank Hecker
Nelson B Bolyard wrote: However, Izenpe may want to consider only including the SHA1 root because many of their customers may be using operating systems that don’t yet support SHA256. snip I think that covers all the considerations that would go into a decision of whether to include only a

Re: Roots that are identical except for signature algorithm and serial number

2009-05-27 Thread Rob Stradling
Frank, Nelson, just in case it's useful... I recall that GlobalSign recently refreshed their GlobalSign Root CA: https://bugzilla.mozilla.org/show_bug.cgi?id=406794 When the new GlobalSign Root CA certificate (which expires in 2028) was added to NSS, the old certificate (which expires in 2014)

Re: Roots that are identical except for signature algorithm and serial number

2009-05-27 Thread Nelson B Bolyard
(Sorry for the apparent tardiness of this reply. I wrote it the day that I read Frank's message, and thought I sent it, but evidently did not send it until today.) Frank Hecker wrote, On 2009-05-22 07:24 PDT: So, just to clarify: I *think* you're proposing that we do the following in cases

Re: Roots that are identical except for signature algorithm and serial number

2009-05-27 Thread Nelson B Bolyard
Rob Stradling wrote, On 2009-05-27 01:35: Frank, Nelson, just in case it's useful... I recall that GlobalSign recently refreshed their GlobalSign Root CA: https://bugzilla.mozilla.org/show_bug.cgi?id=406794 When the new GlobalSign Root CA certificate (which expires in 2028) was added to

Re: Roots that are identical except for signature algorithm and serial number

2009-05-22 Thread Frank Hecker
Nelson Bolyard wrote: On 2009-05-20 13:58, Kathleen Wilson wrote: When processing a cert chain, does Mozilla use a specified algorithm/ order for determining which root to use when there are two roots included that are identical except for signature algorithm and serial number? The algorithm

Re: Roots that are identical except for signature algorithm and serial number

2009-05-21 Thread Eddy Nigg
On 05/21/2009 03:46 AM, Nelson Bolyard: Also related, in bug #490895 VeriSign has requested inclusion of the SHA-1 version of their roots to replace the corresponding old MD5 version of their roots. At the time of inclusion of the SHA-1 version of the roots, is there any reason to keep the old

Re: Roots that are identical except for signature algorithm and serial number

2009-05-21 Thread Nelson Bolyard
Eddy Nigg wrote, On 2009-05-21 15:15: On 05/21/2009 03:46 AM, Nelson Bolyard: Also related, in bug #490895 VeriSign has requested inclusion of the SHA-1 version of their roots to replace the corresponding old MD5 version of their roots. At the time of inclusion of the SHA-1 version of the

Roots that are identical except for signature algorithm and serial number

2009-05-20 Thread Kathleen Wilson
When processing a cert chain, does Mozilla use a specified algorithm/ order for determining which root to use when there are two roots included that are identical except for signature algorithm and serial number? Are there cases when Firefox might see a full cert chain, including the root (which

Re: Roots that are identical except for signature algorithm and serial number

2009-05-20 Thread Arshad Noor
Certificate-chain validation, primarily, works based on the Subject Key Identifier and the Authority Key Identifier extensions. When validation code is presented with multiple certificates that have the same AKIs in the chain, a good programmer will attempt to use the stronger certificate if it

Re: Roots that are identical except for signature algorithm and serial number

2009-05-20 Thread Nelson Bolyard
On 2009-05-20 13:58, Kathleen Wilson wrote: When processing a cert chain, does Mozilla use a specified algorithm/ order for determining which root to use when there are two roots included that are identical except for signature algorithm and serial number? The algorithm for choosing from among